CN106415638A - Method of use of a unique product identification code - Google Patents

Method of use of a unique product identification code Download PDF

Info

Publication number
CN106415638A
CN106415638A CN201580013296.3A CN201580013296A CN106415638A CN 106415638 A CN106415638 A CN 106415638A CN 201580013296 A CN201580013296 A CN 201580013296A CN 106415638 A CN106415638 A CN 106415638A
Authority
CN
China
Prior art keywords
upic
product
user
purchase
database manager
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201580013296.3A
Other languages
Chinese (zh)
Inventor
A·卡波鲁索
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CN106415638A publication Critical patent/CN106415638A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0623Item investigation
    • G06Q30/0625Directed, with specific intent or strategy
    • G06Q30/0627Directed, with specific intent or strategy using item specifications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • G06F16/9554Retrieval from the web using information identifiers, e.g. uniform resource locators [URL] by using bar codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/01Customer relationship services
    • G06Q30/015Providing customer assistance, e.g. assisting a customer within a business location or via helpdesk
    • G06Q30/016After-sales

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computational Linguistics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

A method of use of a unique product identification code (UPIC) being emitted by a database manager, associated with and applied on a product provides a first UPIC query with a database manager for information on the same product by a user through a software application, an evaluation of a validity of the UPIC by the database manager, a response of the database manager to the user with information related to the product, or if the same product was already purchased, a creation of a provisional connection between the user code and the UPIC that is queried through said software application. The user gives a proof of an alleged purchase of the product by a second UPIC query that is made by the same user at the end of a determined first time period from the first UPIC query, with no other user having queried the same UPIC before the second UPIC query.

Description

Method using unique product identification code
Technical field
The present invention relates to a kind of method using the unique product identification code for each product.Especially, this is unique Product identification code issued by database manager and be associated with product and be applied on product, so that can be by electric Sub- equipment is inquiring about this unique product identification code.The method is intended in particular to hit fake products.
Background technology
A kind of use is described in the U.S. Patent application US2007288267A1 that August in 2007 is submitted on the 10th by Fou Method that is being distributed by database manager and visibly applying the globally unique product identification code on product.The party Method comprises the following steps:Whether the unique identification code being received from consumer to database manager inquiry UPIC, determination is right Should in effective product identification code, determine whether unique product identification code was previously inquired about, previous based on such code The fact that be not queried determines the effectiveness of unique product identification code.If effectiveness is not identified, by number According to librarian, the response of consumer is given with fake products, and similar message is sent to other consumers.
Said method specifies, consumer can just buy product before starting determining the process of genuineness of product.This Constitute shortcoming in many cases.Code can neither be inquired about to obtain intending with regard to consumer before buying product by consumer The general information of the feature of product bought and the other information of article itself, nor determine that purchase is intended by consumer The product bought is genuine piece or counterfeit.
The international patent application WO2009/074866 of US priority represent Hosp, having on December 13rd, 2007 retouches State a kind of method with the product of identification code for checking.The database manager of the wherein identification code of storage product can pass through Check whether and in data base, inquired identification code to answer the inquiry to code being carried out by consumer.If identification code exists Past has been queried and once or has alternately been queried fixing number of times, then data base administration person can negate pass Answer in this product.Database manager can queried identification code based in the type of product, its manufacturer, past Number of times, to comment with regard to encroach right data, manufacturer, the criterion selected in the value of product and its original producton location of statistics of product The probability of the personation of the yield by estimation product.It is understood that Hosp does not provide the standard of the master of the product that identification code is queried Really answer.Compared with the patent application of Fou, Hosp allows at any time, i.e. inquiry mark before or after buying product Code, but it does not provide the consumer with any confirmation.It only serve database manager with train (hone) its to product this The assessment of the master of body.
German patent application DE 10 2,006 016830 A1 being submitted on October 11st, 2007 by Springer is open A kind of using by the database manager being defined as prior art in the preamble of the claim 1 in this patent application The method of the unique product identification code issued.Springer does not allow checking to apply at most unique identical code In a product, and therefore, do not allow to verify the product with identical code bought by other users.
Content of the invention
It is an object of the invention to instead providing a kind of method, the method allows any user to obtain with regard to producing The response of the genuineness of product, using as carried out before and after the buying product, result to the inquiry of product identification code.
In the case that another purpose is the control outside not using the relation between manufacturer and user, with automatically and Effective manner is checking the purchase to product by user.
Another object of the present invention be allow not limit the user of the quantity authentication code to inquire about identical product so that Obtain the information with regard to this product.
Another object of the present invention is directed to any active relevant with product before and after buying product and arranges Apply (initiative) and create two-way communication between user and data base.
Equally, communicate it is an object of the invention to creating between user and manufacturer, this communication is not concerned only with product, Also focus on any active measures relevant with product taken before and after buying product by manufacturer or other users Propagation.
Another object of the present invention is the product that suggestion user buys master, the product of described master be possible to have by The excitation of such as discount that manufacturer is provided, gift, integration or the like, and it is typically directed to loyal consumer and occurs 's.
Another purpose is the product of the manufacturer with regard to commercially occurring that counterfeit and manufacturer is led to Know.
Another purpose is to stop potential personator that fake products puts goods on the market.
Another purpose is so that the bucket that the mechanism that controls power (Control Authority) can be at it with counterfeit behavior Immediately it is hit after its fake products is put goods on the market by personator in striving.
These and other purpose are to be determined in independent claims and dependent claims appended by this specification The method using unique product identification code (below is UPIC) of justice is realized.
Brief description
Refer to the attached drawing, shows the preferred embodiment of the method using UPIC, wherein in the following detailed description:
Fig. 1 is the flow chart of the embodiment of the method for the use UPIC according to the present invention, the flow diagrams illustrates by user Database manager is used for executing the step performed by the method.
Specific embodiment
The method of the use UPIC according to the present invention based on the fact that:The issued UPIC of database manager, enter And then associated by manufacturer and apply to its product, this database manager can according to set by database manager simultaneously And the criterion that is described below and intercept identical with those UPIC of product being applied to bought by other users UPIC.
As is known, using the method for UPIC allow any user to the inquiry of database manager in case receive with regard to The information data of this product, wherein, described UPIC is issued by database manager, and is associated by manufacturer and be applied to produce Product are so that create corresponding relation between UPIC and product itself.Term " issue " briefly means that UPIC is by data depositary management Manage that device is generated and be sent to the manufacturer that endorsed supply contract.Term " (active) of activity " is briefly Mean manufacturer single UPIC with about manufacturer itself enter into data base product information data it Between create connection.Term " inquiry " briefly means that UPIC is obtained in data base or is subsequently queried.Term " user " briefly means that the application software being provided by database manager is arranged on such as smart phone, flat board calculates Machine and be obtained in that and send anyone on the electronic equipment of any other equipment of data etc;Described application software And then passed through personal code work and activating pin by uniquely close be coupled to user, described personal code work is to database manager mark Know this user.Term " database manager " briefly means the one of runtime database as hardware and software computer system Cut things.
It is known technology based on the inquiry of UPIC, and various modifications can be carried out according to different selections;Therefore, Do not need these aspects are described in detail.Also should be well known that, after queried UPIC, database manager is assessed The effectiveness of UPIC and provide user and answer, described answer can include genuineness to product and its related letter of feature Breath, and the information with regard to the previous purchase (if any) to identical product by another user, it is right that this information has Face the exchange of the clear and definite risk of non-certified products.
The method according to the invention, by after the given first time period from the first inquiry beginning of user, by same What one user was carried out sets up the criterion for the purchase by user to product declared to the second of UPIC the inquiry, and this first is looked into Ask and create interim connection between UPIC and personal code work.If same user profit after the first time period of described determination Inquire about same UPIC again with same electronic equipment, and assume between first and second inquiries of same user not by Another user inquires about to same UPIC, then this connection becomes permanent.In other words, proving declaring to product Before purchase is associated, only UPIC inquiry once is performed it is allowed to by second user to same UPIC by first user Another one query.Break facing of the static state between UPIC and the personal code work of first user by the inquiry that second user is carried out When connect, restart to be conducive to (in favor of) second user described determined by first time period;In this time period End at, by database manager automatically the second inquiry to same UPIC for the request, this inquiry is to say to database manager Inquiry required for the bright purchase declared by second user to product.Identical situation can betide the 3rd user, and this Three users will itself insert in the interim connection of second user, by that analogy.
When after the invitation of database manager, user to be provided to product to second inquiry of same UPIC by execution The moment of the evidence of the purchase declared of product, database manager give same user to be reserved to the information of user, document and The exclusive access right of benefit.
Once provided the evidence of the purchase declared to product by user, if this product of non-certified products, number Just provide answer according to librarian to the whole other users that should inquire about same UPIC.
Alternatively, the method according to the invention establishes:If terminate in first time period determined by described and In second time period determined by after the invitation of database manager, same user does not carry out the second inquiry to UPIC, then exist Interim connection between the user being identified by the personal code work of itself by database manager and the UPIC of the product inquired about To interrupt.
Advantageously, first time period determined by described in the purchase-transaction impact of product;Especially, the actual purchase to product Buy first time period determined by replacement.Obviously, wherein have to carry out second time period determined by the second inquiry in this feelings No longer have an impact under condition, and be extended to endless or predetermined time.For example, if purchased at retail shop Do not inquire about UPIC before buying, then the checkout counter by shop for the UPIC, this can provide user to this to database manager The proof of the actual purchase of product.
In sum, the method according to the invention, from user to database manager inquire about UPIC step provide as Under one of response response.
In the first Directory Enquiries to movable UPIC, result is to create temporarily connecting between UPIC and personal code work Connect, the information being input in this data base and taken from by manufacturer one group of data is sent to user by database manager.Live Dynamic UPIC means to be distributed to unique code of manufacturer by database manager, and described manufacturer is by UPIC and a set product Data is associated, and is applied to corresponding product.When UPIC is activity and when having interim connection, one will be taken from The information with regard to product of group data is sent to user.When UPIC is activity and when having permanently connected, one group will be taken from The further information with regard to product of data is sent to user.
Database manager identifies that inquired about UPIC is such a code, this code be reserved for user so as User have been provided for proof that the product declared buys and having been able to access the information of same user of being reserved to, document, With after benefit it is allowed to user carries out extra inquiry to same UPIC.On the other hand, if user's inquiry is not belonging to this data UPIC that is storehouse or not being activated, then database manager transmission result (consequential) information.Except carry out Inquiry user outside any other people declare or actual purchase product in the case of, UPIC is construed to by database manager Intercepted, and subsequently send the information (if any) that product is non-certified products.
May even happen that user wants to return user to seller and have been presented for proof that declare or actual purchase Product.When returned work, by described user, the UPIC being retained is revised as the UPIC of activity, so that this UPIC is permissible By subsequent user's inquiry, without misleading answer before purchase and afterwards by transmission.Therefore, have purchased product Above user abandons previously being reserved to his/her information, document or benefit.Hereinafter, in order to illustrate according to the present invention's Using the embodiment of the method for UPIC, first reference is carried out to the flow chart in Fig. 1.
Process starts, and in step 1, obtains UPIC by electronic equipment, and electronic equipment can be for example intelligent Phone, tablet PC or the software for inquiring about UPIC itself being provided by database manager can be provided thereon The other equipment of application.Although not illustrating in a flow diagram in figure 1, provide application soft from by personal code work to him/her The database manager of part carrys out identifying user, and described personal code work can be by the honeycomb electricity of the company's distribution providing telephone service Words number, or the IMEI uniquely identifying each mobile terminal.Alternately, can select to uniquely identify any of user Other users code.User is authorized by the operator of data base to use application soft by activating pin on its electronic equipment Part.Application software allows user detection UPIC.Proceed to step 2, reading is sent to database manager.
In step 3, database manager receives reading and starts the process of the detailed description of UPIC.
Step 4 is decision block, here, whether database manager checking UPIC belongs to its data base.
If UPIC is not belonging to data base, it is transmitted what warning was inquired about in steps of 5 on consumer electronic devices The UPIC not warning in data base or alarm.Process terminates.If UPIC belongs to data base, process movement to decision block 6, Here checks whether UPIC is movable.If not movable, then process advances to step 7, here, sending with regard to this one Segment information and attention and alarm signal, and process terminates.In the case of affirmative reply (that is, UPIC is activation), Whether process movement is to square frame 8, here, having existed permanently connected between the inquired about UPIC of inspection and user.If answered Affirmative, process just moves to decision block 9, here, the user being inquired about and establishment this permanently connected be whether Same person.
If same person, then process goes to step 10, here, the security information with regard to the benefit for user is sent out Give user;Then, process movement is to decision block 11, here, checking whether user has been received by integration or other benefits.
In the case of being negative response in decision block 11, process comes step 12, here, reward points or other are good Locate, and process terminates.In the case of positive response, process terminates.
If in decision block 9, the answer is in the negative, i.e. the user being inquired about and create that this is permanently connected not It is same person, then process comes step 13, here, sending warning or alarm on an electronic device, its warning is asked UPIC term other people have been presented for the product of proof that declare or actual purchase:Involved product is not probably Certified products and process terminates.
If in decision block 8, the answer is in the negative, i.e. does not exist permanently connected, then between UPIC and personal code work Process reaches decision block 14.
Here, database manager inspection whether there is between UPIC and personal code work and is connected temporarily.Affirmative reply Mean that previous user queried same UPIC, and database manager start determined by first time period, this first So that user can carry out the second inquiry to UPIC after time period.In the case of affirmative reply, process goes to decision block 15, here, checking whether interim connection belongs to the user being inquired about.In the case of affirmative reply, process is gone to down One waiting step 21.In the case of being negative answer at decision block 15, the inquiry to UPIC by user in step 16 Interrupt existing interim connection, and first time period determined by replacement in next step 17.Process reaches step 18, Here, creating new interim connection.If do not exist between UPIC and personal code work be connected temporarily, reach from decision block 14 Identical step 18.
In step 19, determined by first time period start, after this first time period, same UPIC can be carried out Second inquiry.
In step 20, the genuineness range of information fragment also relating to product is sent to the electronic equipment of user.
In step 21, database manager wait for determined by first time period, after this first time period, make Obtain user and can carry out the second inquiry to UPIC.
In decision block 22, determined by inspection, whether first time period goes over.
If it is not, process returns in the waiting step 21 of upstream.
If determined by first time period pass by, process goes to step 23, here, database manager starts Determined by second time period, make user UPIC is carried out the second inquiry (step 24) and simultaneously in step 25 to Family electronic equipment sends invites.
In step 26, database manager waits user to complete the second inquiry.In controller chassis 27, database manager Whether second time period determined by determination exhausts, in this second time period, user must carry out the second inquiry so that Create permanently connected between his/her personal code work and UPIC.
If answer is affirmative, i.e. determined by second time period exhaust without being inquired about, then process arrives Reach step 28, here, interrupting the interim connection between personal code work and UPIC.Then, process terminates.
In the case of in controller chassis 27, the answer is in the negative, i.e. determined by second time period do not exhaust, then exist In step 29, database manager checks whether user performs the second inquiry.
In the case of being negative acknowledge in step 19, i.e. also do not carry out the second inquiry, process returns to waiting for step 26.
In the case of affirmative acknowledgement (ACK), create permanently connected between personal code work and UPIC in step 30.Then, In step 31, one group of security information fragment is sent to electronic user devices, and in following step 32, will integrate Or other income distributes to user.In following step 33, enable the button for returning bought product, using this Button, user has the right to cancel and buys and return received integration or income.Then, process terminates.
In the above description, permanently connected between UPIC and personal code work to creating, to draw to product The process of the proof of purchase that declare or reality gives specific consideration.In this regard, the checkout cabinet of retail shop Platform provides the confirmation of the actual purchase of product to database manager, rather than after first time period determined by being given at and Determined by second time period terminate before the purchase declared that the second inquiry is identified is carried out by user to same UPIC Confirm, and without checkout counter.
In view of by checkout counter institute role, there is provided below step.Trustship in checkout counter and with The firm UPIC reading is sent to database manager by the software application that its personal code work is associated.Data management system passes through checkout The personal code work of sales counter identifies that it is superuser.Meanwhile, database manager executes following functions automatically:Reset and determined First time period and by determined by second time period be set to the time of endless or predetermined time.
Return to the situation of returned work, as mentioned above, it is known that can buy product and then for various reasons and according to Using electronics reimbursement or product is returned to seller to method by the mode exchanged goods.If meanwhile, user has created in its user Permanently connected between code and UPIC, once then product is retired, database manager allows for reactivating this UPIC, with Just avoid being sent to after by previous user's returned work before purchase and afterwards by the answer of misleading and will inquire about together The user of one UPIC.
Previously have purchased product and the permanently connected user creating between its personal code work and UPIC start new Inquire about and send returning of product to database manager.
Database manager identifies that personal code work is to create one of permanently connected user with UPIC user 's.
Database manager record needs to reactivate the personal code work of process.
Database manager verifies that this UPIC is the code retaining and is changed into activity.Database manager is demonstrate,proved Bright user not being permanently attached to this UPIC, this is because he/her return product and losing previously be reserved to he/ Her information, document and income.Obviously, the method according to the invention takes all of preventive measure so that can not by with (reproduce) this UPIC is replicated to provide the false proof of the purchase declared of product in family.Soft using prior art Part application is capable of identify that whether the UPIC being applied on product is again produced, replicates, regenerating, shooting.
It should be appreciated that having been realized in the method according to the object of the invention.
The method allows to manufacture not reproducible UPIC.
Additionally, the method allow not limit quantity user inquire about identical product UPIC so as before to buy product and There is information with regard to this product afterwards.
The method creates the two-way communication of user and manufacturer, this two-way communication not only about product, also with regard in purchase Any active measures being carried out by manufacturer before and after buying.Each user is set by his telephone number or other electronics Standby, or identified by other personal identification codes, this can also be for preventing to being arranged on phone or other electronic users set Standby upper application software wrongful using useful.On the contrary, when by any user carry out to the method according to the invention not just When use when, for example provide declare buy proof without actually buying product, database manager can intercept him/her Personal code work, and the identifier of his electronic equipment registered, result is to stop described user from accessing with regard to using The extra information of the product of UPIC, and deduct the whole integrations previously being accumulated and interests by this user.If user's row It is proper, he/her can enjoy and equally be provided by manufacturer before buying product and after especially buying product Discount, gift, integration etc..
It is to be further understood that thanks to the inquiry to UPIC being carried out by user or from consumer, retailer or Control power the report receiving at mechanism, can notify commercially exist wrongly to marked their product to manufacturer The fake products of board.
Most of all, preventing fake producer using the trade mark of the manufacturer employing the method according to the invention through awarding Production and selling fake products on the market of power, because:
1st, manufacturer should notify consumer only to buy the product of the UPIC having the method according to the invention;Exist in user In the case that on market, discovery does not have the product of UPIC, he/her will not execute and buy and will illustrate abnormal conditions, because existing The substantially product of personation.
2nd, when each product of manufacturer and when being applied to UPIC, and when being sent to consumer, fake producer Introduce in authorizing market fake products, undeservedly the unique chance using brand be to buy the real product of n, replicate n Individual UPIC and being applied on fake products;Economic loss is obvious, and therefore infeasible for fake producer.If made False person alternatively puts into him on authorizing market and applies unique and identical UPIC always n fake products, user's foot To provide evidence that declare or actual purchase, this is because database manager intercepts identical UPIC, can be in purchase The non-genuineness of every other these products of user report of inquiry is carried out before other fake products.
3rd, the mark of fake products is so that distribution chain and the distributor to fake products and manufacturer can be followed the trail of Swing into action is possibly realized, to give to hit the country of personation and the world controls power the substantial support of mechanism.
Obviously, allow the method according to the invention to be modified and changes, it falls and is being determined in the following claims In the scope of the present invention of justice.

Claims (13)

1. a kind of method using the unique product identification code (UPIC) being sent by database manager, described unique product Product identification code is associated with product and is applied to product so that described UPIC can be inquired about by electronic equipment, described Method includes:
Carry out inquiring about for a UPIC of the information with regard to identical product to database manager from user by software application, Described software application in such as smart phone, tablet PC or can obtain and sends the other equipment of data etc Can download on electronic equipment and described user is uniquely associated with by personal code work, wherein said database manager leads to Cross described personal code work and described user identified by activating pin,
By described database manager, the effectiveness of described UPIC is estimated,
Described database manager with the information relevant with described product or with the information that whether have purchased identical product And described user is responded,
Create the interim connection and the described UPIC being inquired about by described software application between in described personal code work,
It is characterized in that, by by same user from described first UPIC inquiry determined by first time period end The 2nd UPIC inquiry carrying out at tail, described user gives the proof of the purchase declared to described product, wherein described Other users are not had to inquire about same UPIC before 2nd UPIC inquiry.
2. method according to claim 1, wherein, before user is given to the purchase declared described in described product only Only inquired about by the UPIC that described user has carried out once, this permission:
By the another one query to described same UPIC for another user of the information receiving about described product, and
Restart to obtain described being determined needed for proofs of the purchase declared to described product by another user described First time period.
3. method according to claim 1, wherein, is inquired about in institute to the second of described same UPIC by described same user Carry out after stating the invitation of database manager.
4. method according to claim 1, wherein, is created to second inquiry of described same UPIC by described same user Permanently connected between the described personal code work of described UPIC and described same user.
5. method according to claim 4, wherein, described permanently connected gives described same user to the letter retaining to it The exclusive access right of breath, document and interests.
6. method according to claim 1, wherein, is being given to described product from user to described database manager The inquiry to described same UPIC after the proof of the described purchase declared is to the every other use inquiring about described same UPIC Family provides the response of the non-genuineness of described product, if any.
7. method according to claim 1, wherein, if opened at the described end of first time period determined by described Determined by beginning, described same user does not carry out described 2nd UPIC inquiry in second time period, then described personal code work with Described interim disconnecting between the UPIC being inquired about.
8. method according to claim 1, wherein, by product purchase transaction by the purchase declared described in product Described proof confirms as the true proof of the purchase to identical product, by described product purchase transaction will be described determined by One time period reset to zero.
9. method according to claim 8, wherein, by product purchase transaction by the purchase declared described in product Described proof confirms as the true proof of the purchase to described identical product, is determined described by described product purchase transaction Second time period be extended for endless.
10. method according to claim 8, wherein, by product purchase transaction by the purchase declared described in product Described proof confirm as the true proof of the purchase to described identical product, by described product purchase transaction by described really Fixed second time period is extended for the time pre-setting.
11. methods described in any one in 10 according to Claim 8, wherein, described purchase-transaction is sent out in retail shop Raw, and include:
Described UPIC inquiry is carried out to described database manager from cashier's machine,
First time period determined by will be described resets to zero, and thereafter, described user can repeat described UPIC and inquire about and visit Ask information, document or the interests retaining to it, and
Second time period determined by will be described extends, and during it, described user must repeat described UPIC and inquire about to access Information, document or the interests retaining to it.
12. methods according to any one in aforementioned claim, wherein, from described user to described data base administration The described UPIC inquiry that device is carried out provides one of following response response:
UPIC is not belonging to described data base, in this case, object information is sent to described user;
There is the effective UPIC of interim connection, in this case, the product information from one group of data is sent to described use Family;
After having carried out the 2nd UPIC inquiry at described user end of first time period determined by described, have permanent The effective UPIC connecting, in this case, the further product information from one group of data is sent to described user;
Having been presented for the proof to the declaring of product or actual purchase and have accessed to its guarantor in described user Situation about after information, document and the interests stayed, the described same UPIC with regard to described product further being inquired about Under, the UPIC that retained;
Non-effective UPIC in the case of not being the UPIC of activation, and send object information;
In the case of by the user different from the user being inquired about to the declaring of described product or actual purchase, intercept UPIC, and subsequently send the product information of non-certified products, if any.
13. methods according to claim 12, wherein, in the case that product is return retail shop, by having been given by Described UPIC is changed over by the UPIC of activity to the user of the declaring of described product or the proof of actual purchase, result is to give up Information, document and the interests retaining to it.
CN201580013296.3A 2014-03-10 2015-03-08 Method of use of a unique product identification code Pending CN106415638A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
ITRM2014A000110 2014-03-10
ITRM20140110 2014-03-10
PCT/IB2015/051688 WO2015136426A1 (en) 2014-03-10 2015-03-08 Method of use of a unique product identification code

Publications (1)

Publication Number Publication Date
CN106415638A true CN106415638A (en) 2017-02-15

Family

ID=50693876

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201580013296.3A Pending CN106415638A (en) 2014-03-10 2015-03-08 Method of use of a unique product identification code

Country Status (6)

Country Link
US (1) US20170076351A1 (en)
EP (1) EP3138064A1 (en)
KR (1) KR20160131024A (en)
CN (1) CN106415638A (en)
TW (1) TW201543390A (en)
WO (1) WO2015136426A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101670496B1 (en) * 2014-08-27 2016-10-28 주식회사 파수닷컴 Data management method, Computer program for the same, Recording medium storing computer program for the same, and User Client for the same

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1582016A (en) * 2003-08-09 2005-02-16 于正月 Dynamic anticounterfeit identifying method using mobile phone communication
DE102006016830A1 (en) * 2006-04-07 2007-10-11 Martin Springer Branded product e.g. track shoe, protecting method, involves reading bar code in product using mobile telephone e.g. camera phone, and directly verifying authenticity of product with telephone by comparison with branded product data base
US20070288267A1 (en) * 2003-09-02 2007-12-13 Augustine Fou Method of authentication using universally unique identifiers
WO2009074866A2 (en) * 2007-12-13 2009-06-18 Daphne Roswita Hosp Verification system
CN102289651A (en) * 2011-08-10 2011-12-21 深圳市通产丽星股份有限公司 Label checking method and system
CN103198411A (en) * 2013-04-16 2013-07-10 淄博易通轻工制品有限公司 Method for verifying genuineness of product repeatedly

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7379899B1 (en) * 1998-11-13 2008-05-27 Nintendo Of America Inc. Method and apparatus for verifying product sale transactions and processing product returns
US20110225064A1 (en) * 2003-09-02 2011-09-15 Augustine Fou Methods and systems for using universally unique item identifiers
MY191823A (en) * 2007-08-03 2022-07-18 Omarco Network Solutions Ltd A system and a method of handling a multifunction transaction
US20120191566A1 (en) * 2011-01-20 2012-07-26 Eugene Sayan Product information, vendor referral, and purchase based on scanned indicia
US9256881B2 (en) * 2013-11-08 2016-02-09 Vattaca, LLC Authenticating and managing item ownership and authenticity
WO2015160505A1 (en) * 2014-04-14 2015-10-22 Jenda Tag Llc System and method for product authentication

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1582016A (en) * 2003-08-09 2005-02-16 于正月 Dynamic anticounterfeit identifying method using mobile phone communication
US20070288267A1 (en) * 2003-09-02 2007-12-13 Augustine Fou Method of authentication using universally unique identifiers
DE102006016830A1 (en) * 2006-04-07 2007-10-11 Martin Springer Branded product e.g. track shoe, protecting method, involves reading bar code in product using mobile telephone e.g. camera phone, and directly verifying authenticity of product with telephone by comparison with branded product data base
WO2009074866A2 (en) * 2007-12-13 2009-06-18 Daphne Roswita Hosp Verification system
CN102289651A (en) * 2011-08-10 2011-12-21 深圳市通产丽星股份有限公司 Label checking method and system
CN103198411A (en) * 2013-04-16 2013-07-10 淄博易通轻工制品有限公司 Method for verifying genuineness of product repeatedly

Also Published As

Publication number Publication date
US20170076351A1 (en) 2017-03-16
KR20160131024A (en) 2016-11-15
WO2015136426A1 (en) 2015-09-17
TW201543390A (en) 2015-11-16
EP3138064A1 (en) 2017-03-08

Similar Documents

Publication Publication Date Title
US10412071B2 (en) Secure transaction systems and methods
KR101496939B1 (en) Mobile coupons utilizing peer to peer ranging
CA2888800C (en) Payment processing access device and method
US8595062B2 (en) Systems and/or methods for fraud detection in award point programs
CN1998019A (en) System and method for securely authorizing and distributing stored-value card data
US10796320B2 (en) Systems and methods for passively determining a ratio of purchasers and prospective purchasers in a merchant location
CN105894313A (en) Methods And Apparatus To Associate Transactions With Media Impressions
CN107657367B (en) Retail performance statistical method based on two-dimension code
CN103886468A (en) Anti-counterfeiting method and system based on mobile intelligent terminal
CN112508561A (en) Coupon data sharing method and device, block chain sharing platform and storage medium
CN109872223B (en) Virtual article transaction method, device, equipment and storage medium
KR20190009921A (en) Terminal and platform for authenticating genuine products and the authenticating method by using the same
CN109547554A (en) No card interactive system and simulation card apparatus
CN105283892A (en) Method for providing e-commerce secure transactions
CN106415638A (en) Method of use of a unique product identification code
CN106600254B (en) Multi-account management method and device for user
US20160155133A1 (en) Authentication method for consumer products via social networks
US20230196401A1 (en) Methods, systems, and devices for managing information between merchants, intermediaries and/or end users
US8868719B1 (en) Identity and reputation monitoring
CN106296327A (en) The self-service method of inspection of virtual objects and self-service transfer method
CN109523278A (en) A kind of shopping online verifying system based on goods marks
KR20000036568A (en) System and method for selling merchandise by using network
CN113689232B (en) Method and device for detecting crowd recall service and electronic equipment
CN101571943A (en) Relay type authentication anti-counterfeiting method
Lanza Aggregated And Anonymized Tracking Of Offline Purchases in Response to Sponsored Content in a Voice Activated Computing System

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170215

WD01 Invention patent application deemed withdrawn after publication